Team for Research in
Ubiquitous Secure Technology

A Survey of Mobile Malware in the Wild -
Adrienne Porter Felt, Mtthew Finifter, Erika Chin, David Wagner

Citation
Adrienne Porter Felt, Mtthew Finifter, Erika Chin, David Wagner. "A Survey of Mobile Malware in the Wild -". ACM Workshop on Security and Privacy in Mobile Devices (SPSM), ACM, 17, October, 2011.

Abstract
Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We also use this data set to evalu- ate the e ectiveness of techniques for preventing and identifying mobile malware. After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on Android phones, we also examine the incentives that cause non-malicious smartphone tinkerers to publish root exploits and survey the availability of root exploits.

Electronic downloads

Citation formats  
  • HTML
    Adrienne Porter Felt, Mtthew Finifter, Erika Chin, David
    Wagner. <a
    href="http://www.truststc.org/pubs/847.html" >A
    Survey of Mobile Malware in the Wild -</a>, ACM
    Workshop on Security and Privacy in Mobile Devices (SPSM),
    ACM, 17, October, 2011.
  • Plain text
    Adrienne Porter Felt, Mtthew Finifter, Erika Chin, David
    Wagner. "A Survey of Mobile Malware in the Wild
    -". ACM Workshop on Security and Privacy in Mobile
    Devices (SPSM), ACM, 17, October, 2011.
  • BibTeX
    @inproceedings{FeltFinifterChinWagner11_SurveyOfMobileMalwareInWild,
        author = {Adrienne Porter Felt and Mtthew Finifter and Erika
                  Chin and David Wagner},
        title = {A Survey of Mobile Malware in the Wild -},
        booktitle = {ACM Workshop on Security and Privacy in Mobile
                  Devices (SPSM)},
        organization = {ACM},
        day = {17},
        month = {October},
        year = {2011},
        abstract = {Mobile malware is rapidly becoming a serious
                  threat. In this paper, we survey the current state
                  of mobile malware in the wild. We analyze the
                  incentives behind 46 pieces of iOS, Android, and
                  Symbian malware that spread in the wild from 2009
                  to 2011. We also use this data set to evalu- ate
                  the eectiveness of techniques for preventing and
                  identifying mobile malware. After observing that 4
                  pieces of malware use root exploits to mount
                  sophisticated attacks on Android phones, we also
                  examine the incentives that cause non-malicious
                  smartphone tinkerers to publish root exploits and
                  survey the availability of root exploits.},
        URL = {http://www.truststc.org/pubs/847.html}
    }
    

Posted by Mary Stewart on 4 Apr 2012.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.